Efficient proofs that a committed number lies in an interval
From MaRDI portal
Publication:3374927
zbMATH Open1082.94534MaRDI QIDQ3374927FDOQ3374927
Authors: Fabrice Boudot
Publication date: 1 March 2006
Recommendations
Cited In (47)
- Towards restricting plaintext space in public key encryption
- A secure and efficient proof of integer in an interval range
- Efficient, Robust and Constant-Round Distributed RSA Key Generation
- On the Portability of Generalized Schnorr Proofs
- Privacy-Preserving Similarity Evaluation and Application to Remote Biometrics Authentication
- A general, flexible and efficient proof of inclusion and exclusion
- New RSA-Based (Selectively) Convertible Undeniable Signature Schemes
- A Novel Range Test
- Practical Range Proof for Cryptocurrency Monero with Provable Security
- Privacy-preserving data aggregation with probabilistic range validation
- Efficient Protocols for Set Membership and Range Proofs
- Cryptanalysis and improvement of an ID-based ad-hoc anonymous identification scheme at CT-RSA 05
- Augmented oblivious polynomial evaluation protocol and its applications
- A reduction of security notions in designated confirmer signatures
- Zero-knowledge range arguments for signed fractional numbers from lattices
- Title not available (Why is that?)
- Compact E-Cash and Simulatable VRFs Revisited
- Complex Zero-Knowledge Proofs of Knowledge Are Easy to Use
- A Verifiable Secret Sharing Scheme Based on the Chinese Remainder Theorem
- Efficient Non-interactive Range Proof
- Electronic jury voting protocols
- Zero-Knowledge Authenticated Order Queries and Order Statistics on a List
- A framework for constructing convertible undeniable signatures
- Blind Identity-Based Encryption and Simulatable Oblivious Transfer
- Rational modular encoding in the DCR setting: non-interactive range proofs and Paillier-based Naor-Yung in the standard model
- On server trust in private proxy auctions
- Towards zero knowledge argument for double discrete logarithm with constant cost
- How to deal with malicious users in privacy‐preserving distributed data mining
- Zero-knowledge arguments for subverted RSA groups
- Secure authenticated comparisons
- Multilevel threshold secret sharing based on the Chinese remainder theorem
- Several cryptographic applications of \(\Sigma\)-protocol
- Encryption switching protocols
- Vector commitments with proofs of smallness: short range proofs and more
- Removing the strong RSA assumption from arguments over the integers
- Fast secure two-party ECDSA signing
- Non-interactive provably secure attestations for arbitrary RSA prime generation algorithms
- Signatures and efficient proofs on committed graphs and NP-statements
- Efficient range proofs with transparent setup from bounded integer commitments
- Efficient RSA key generation and threshold Paillier in the two-party setting
- Efficiency limitations for \(\Sigma \)-protocols for group homomorphisms
- Efficient RSA key generation and threshold Paillier in the two-party setting
- Two-sided malicious security for private intersection-sum with cardinality
- Universally composable \(\varSigma \)-protocols in the global random-oracle model
- Sanitizable Signatures Revisited
- Secure Two-Party Computation of Squared Euclidean Distances in the Presence of Malicious Adversaries
- Efficient Binary Conversion for Paillier Encrypted Values
This page was built for publication: Efficient proofs that a committed number lies in an interval
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3374927)